Batch 16
Upcoming round deadline: December 23, 2024 at 11:59 PM | Application Fee: INR 2000 + GST
Cybersecurity as a career requires thinking quickly and strategically to ward off data breaches and network takeovers. It entails a strategic cat-and-mouse game of ever-changing defensive and offensive techniques. As a cybersecurity specialist on the frontline protecting enterprise IT networks and other critical internet-based information systems against cyberattacks, you have to decide which approach to apply when. This is what joining the Post Graduate Certificate in Cybersecurity from MIT xPRO will teach you while developing your capability and giving your resume the MIT xPRO advantage! It's an immersive certificate program that will provide you with a comprehensive introduction to cybersecurity focused on the defensive and offensive aspects of technology. You will also benefit from receiving personalized feedback from program leaders, insights from guest speakers, career coaching, mentorship from leading faculty who are thought leaders in the field, and the opportunity to create a capstone network development project for a job portfolio.
A certificate from MIT xPRO to recognize your skills and success
Insights and case studies from renowned MIT faculty
Market-ready cybersecurity skills in a high-growth market
Capstone presentation project to share with potential employers
Access to cutting-edge tools and frameworks from MIT
Bi-weekly doubt clearing session with learning facilitators
The NIST CSF framework is threaded throughout the entire program as a commonly used framework. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.
The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the defensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.
The MITRE ATT&CK® knowledge base is explored deeper in the offensive and defensive pieces of this program. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.
Security Information and Event Management Tools
User and Entity Behavior Analytics Tools
Endpoint Detection and Response Tools
Security Orchestration and Response Tools
Incident Response Tools
Penetration Testing Tools
Encryption Tools
Network Security Monitoring Tools
Social Engineering Toolkit
Mid-level and Senior-level career professionals who have established their careers in information technology and are looking to improve their organization's preparedness and response against cyberattacks and grow their career as leaders in cybersecurity strategies will benefit most from this program.
Additionally, graduates and early career professionals with or without prior experience in the IT field who want to specialize in cybersecurity from a globally recognized school and accelerate their career in a high-growth field with high-demand job opportunities will benefit from this program.
Eligibility: Candidates with 5+ years of work experience.
After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, with the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.
Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management
Dr. Pearlson is the executive director of Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has ...
Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT
Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his...
3Com Founders Principal Research Scientist, Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab
Daniel Weitzner is the founding director of the MIT Internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public poli...
John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)
Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT ...
Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School
Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cyberse...
Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL
Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, ad...
Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management
Securing information systems is Barbara's purpose and educating security professionals is her passion.
Barbara Johnson is a Senior Security, Audit and Compliance Management C...
Information Security Officer and Director of Research Computing, MIT Sloan School of Management
Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Slo...
Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts
Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambrid...
The first three months of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and IAM (identity and access management).
The second set of three months focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.
The next set of months address the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.
Participants will work on a capstone project detailing the Equifax data breach of 2017 and associated events.
Participants will analyse the data breach which resulted in the breach of data of 140 million consumers.
They will investigate what were the primary reasons of the breach and gaps in cybersecurity in the case, using the knowledge gained during the course.
Participants would then create a defensive and offensive strategy to tackle such breaches and present their findings and their key insights in detail.
The project will help participants observe, analyse, and implement their learnings in a real-life case and get the best out of the MIT Post Graduate in Cybersecurity course.
Learning Facilitator, Co-Founder and Chief Technology Officer - CyberNX Technologies Private Limited
Bhowmik Shah is a seasoned Systems and Security professional with global experience with enterprises across Australia, USA, and India. He has an extensive background in DevOps...
Next-Generation Cybersecurity Leader - United Airlines, PwC, CNBC / NBCUniversal, 7Eleven, US Presidential Election Security (NDIT), AIG Founder of Israel Technologies Inc. Sr. Consultant - PaloAlto Networks
Golam Azam commands 15 plus years of core experienced versatile Cybersecurity Leadership, Teacher, Architect, Writer & Mentor with Executive MBA and outstanding Computer Engin...
Registration for this program is done through Emeritus. You can contact us at mit.xpro@emeritus.org
This program is open for enrolments for residents of India, Bangladesh, Bhutan, Myanmar, Nepal, Pakistan, Sri Lanka, Philippines, Indonesia, Thailand, Vietnam and Malaysia only.
Note:
Learning facilitator details and office hour dates and timings are from previous batches. The learning facilitators may change for upcoming batches based on availability and the office hour timings and dates may be changed based on a mutually decided schedule between Emeritus and the Learning facilitator.
*Mentioned timelines are tentative.
Career Management Modules on:
Building an Impressive Resume & Cover Letter
Building an Impressive LinkedIn Profile
Navigating Job Search
Interview Preparation
Job Assistance
Please note:
This service is available only for Indian residents enrolled into select Emeritus programs.
MIT xPRO or Emeritus do NOT promise or guarantee a job or progression in your current job. Career Services is only offered as a service that empowers you to manage your career proactively. The Career Services mentioned here are offered by Emeritus. MIT xPRO is NOT involved in any way and makes no commitments regarding the Career Services mentioned here.
Program Fee | Maximum Loan Amount | Tenure (months) | EMI |
---|---|---|---|
INR 2,87,000 | INR 3,38,660 | 12 | INR 30,903 |
Program Fee | Maximum Loan Amount | Tenure (months) | EMI |
---|---|---|---|
INR 2,87,000 | INR 3,38,660 | 24 | INR 16,792 |
Program Fee | Maximum Loan Amount | Tenure (months) | EMI |
---|---|---|---|
INR 2,87,000 | INR 3,38,660 | 36 | INR 12,088 |
Program Fee | Maximum Loan Amount | Tenure (months) | EMI |
---|---|---|---|
2,87,000 | 3,38,660 | 48 | 9,736 |
Program Fee | Maximum Loan Amount | Tenure (months) | EMI |
---|---|---|---|
2,87,000 | 3,38,660 | 60 | 8,325 |
Note:
The above EMI's are indicative and figures in INR are approx.
The EMI's offered by each of the loan providers might vary from the above figures, depending upon tenure and loan amount to be disbursed.
Our Program Advisors will help you with information on how to avail a loan from our loan providers.
*Applicable only for Indian residents.
What is it like to learn with the learning collaborator, Emeritus?
More than 300,000 professionals globally, across 200 countries, have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded. All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes, the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner during the course period the cost of which is already included in the overall Course fee of the course.
A dedicated program support team is available 7 days a week to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.
Flexible payment options available.
Starts On